网站首页  词典首页

请输入您要查询的英文单词或汉字:

 

词汇 untrusted
释义 untrusted ˌʌnˈtrʌstid COCA²³⁶¹⁷⁷BNC²³⁶²¹³⁺¹iWeb²⁷⁴⁷⁶
基本例句
adj.非置信的
All it takes is an application with some dynamically constructed SQL and untrusted user input.
它所利用的只是具有一些动态构造的 SQL和不可信用户输入的应用程序。 cnblogs

You should consider each of these inputs when you're writing your program, and if they are untrusted, carefully filter them.
当您编写程序的时候这些输入每一个都应该考虑,如果它们不可信,一定要谨慎对它们进行过滤。 ibm

Accepting user input or any other data from an untrusted source is one of the most common risks a PHP developer can take when developing applications.
接受用户输入或来自不受信任来源的任何其他数据是 PHP开发人员在开发应用程序时可能承担的最常见风险之一。 ibm

All messages in transit should be protected from tampering by untrusted intermediaries.
应该防止传输中的所有消息受到不可靠中介的篡改。 ibm

Because these are trusted system classes, the bootstrap loader skips much of the validation that gets done for normal untrusted classes.
因为这些是可信的系统类,所以引导程序装入器跳过了对常规不可信类所做的大量验证。 ibm

Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.
显然,您需要考虑某种安全模型以限制不可信资源的加载。 ibm

Don't trust file contents that can be controlled by untrusted users.
不要信任可以被不可信用户控制的文件内容。 ibm

For example, you would become untrusted if two minutes elapsed without any activity within the bank.
例如,如果在银行您两分钟后仍无任何活动的话,将变成不可信的。 ibm

If, however, your DB2 database receives XML data from untrusted sources and you need to ensure schema compliance at the DB2 level, then you need to spend some extra CPU cycles on that.
但是,如果 DB2数据库从不信任的地方接收 XML数据,而又需要在 DB2上确保模式遵从性,那么就需要在这方面花费一些额外的 CPU周期。 ibm

If data comes from a network, you should usually treat it as highly untrusted.
如果数据来自于网络,您应该认为它是高度不可信的。 ibm

If you can, don't place files in directories that can be shared with untrusted users.
如果可以,不要将文件放置在可以由不信任用户共享的目录中。 ibm

In most cases, this network is the Internet, which must be considered untrusted.
在大多数情况下,这个网络即互联网,必须被看作是不可信的。 infoq

It has grown from this seed into much more, but the fact remains that we use it to gather and manipulate data from many untrusted sources.
它现在的功能早已不限于此了,但是我们现在仍然在用它来收集和操作来自许多不受信任的源的数据。 ibm

Note that the first time you connect, your browser is likely to complain about an untrusted certificate, because you generated your certificate yourself.
注意,第一次连接时,您的浏览器可能会提醒您使用了一个未被信任的证书,因为您生成了自己的证书。 ibm

Sometimes your program will take data from an untrusted user and give it to another user.
有时候您的程序要从一个不信任的用户处得到数据并把它传给其他的用户。 ibm

The first line of defense in a secure program is to check every untrusted input.
安全的程序中第一道防线是检查每一个不可信的输入。 ibm

The principal security requirement is that untrusted code should not be able to change the logging configuration.
为了保证安全,日志操作需要保证不受信的代码无法修改日志控制配置。 blog.sina.com.cn

The untrusted data is referred to as tainted data, while the code ensuring that the data is not malicious is called a sanitizer, and is often said to clean the taint.
这个非信任数据被看作是污染的数据,当这个代码确保这个数据是非恶意就称作杀毒功能,通常也称作杀毒污染的东西。 ibm

This analysis aims at identifying the flow and use of untrusted data within an application.
这个分析主要是以检查这个流和应用程序中不信任代码使用为目的的。 ibm

This configuration provides the ability to assign different permissions and access levels based on access from the trusted network and the untrusted Internet.
这个配置提供根据从可信网络还是从不可信互联网访问分配不同的权限和访问级别的能力。 ibm

Thus, you need to ruthlessly check data on all input paths into your program from untrusted sources.
因而,您需要对来自于不可信源的输入路径的数据进行严格的检查。 ibm

Using XML encryption lets you keep your message content secret when operating over any type of connection, even when untrusted intermediaries are involved in the processing.
使用 XML加密可以使您在操作任何类型的连接时保持消息内容的私密性,即使在处理过程中涉及到不可信的代理。 ibm

When communicating with untrusted systems such as a B2B interface, SSL assures that connections originate from a specific untrusted system.
在与不可信系统如 B2B接口进行通信时, SSL可以确保这些连接来源于一个特定的不可信系统。 ibm

While such work is ongoing, and until more experience is gained with LSM- protected containers, you should not put all your trust in these mechanisms to protect against an untrusted root user.
尽管这些工作正在进行当中,在获得更多关于受 LSM保护的容器的经验之前,您不应该完全信赖这些机制来阻止不可信的根用户。 ibm

XSS is a similar kind of problem; this time, the untrusted data is targeted at the people browsing your site, rather than your application itself.
XSS也是一个类似的问题。不过这一次不受信任的数据瞄准的是浏览站点的人们,而不是应用程序本身。 ibm

Yet uncontrolled access can create major security risks in other cases, such as when code is executed in an environment shared by untrusted code.
但是,在其它情况下,不受控制的接入会带来严重的安全性风险,如当代码在不值得信任的代码共享的环境中运行时。 ibm

You can use WSS to protect the authenticity, integrity, and confidentiality of messages from untrusted network and transport intermediaries.
可用 WSS防止消息的真实性、完整性和机密性受到不可靠网络和传输中介的攻击。 ibm
随便看

 

英汉汉英双解词典包含9999994条英汉翻译词条,涵盖了常用英语单词及词组短语的翻译及用法,是英语学习的必备工具。

 

Copyright © 2000-2024 tbdmj.com All Rights Reserved 更新时间:2025/1/24 4:58:07